Forensics

Results: 1448



#Item
41

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Fast Detection of Transformed Data Leaks Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Senior Member, IEEE, and Wu-chun Feng, Senior

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2015-11-16 11:42:26
    42

    Digital Audio Forensics: A First Practical Evaluation on Microphone and Environment Classification Christian Kraetzer, Andrea Oermann, Jana Dittmann and Andreas Lang Research Group Multimedia and Security Department of C

    Add to Reading List

    Source URL: omen.cs.uni-magdeburg.de

    Language: English - Date: 2015-08-25 06:53:44
      43

      IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

      Add to Reading List

      Source URL: www.chaum.com

      Language: English - Date: 2017-08-15 16:01:24
        44Computing / Data management / Database management systems / Database / In-memory processing / Scalability / Extensible Storage Engine / Data / High-performance Integrated Virtual Environment

        Native Actors: How to Scale Network Forensics Matthias Vallentin Dominik Charousset UC Berkeley

        Add to Reading List

        Source URL: matthias.vallentin.net

        Language: English - Date: 2018-02-10 06:49:34
        45

        CONFERENCE REPORT International Conference Audio Forensics

        Add to Reading List

        Source URL: www.aes.org

        Language: English - Date: 2017-09-12 06:17:43
          46

          Armstrong Police Cyber Forensics Division Recommendation for the State Transformation in Action Recognition (STAR) program. 1. How long has the program operated? What was the month and year of initiation? The Armstrong S

          Add to Reading List

          Source URL: www.slcatlanta.org

          Language: English - Date: 2015-08-12 14:59:02
            47

            Dear All,   I would like to, on behalf of whole EAI and I, sincerely thank you for attending ICDF2C 2015 conference in Seoul. I really hope you all enjoyed this conference as well as your time in South Korea and it was

            Add to Reading List

            Source URL: archive.d-forensics.org

            Language: English - Date: 2018-01-31 08:56:10
              48

              DATASHEET Trimble Reveal SOFTWARE

              Add to Reading List

              Source URL: forensics.trimble.com

              Language: English - Date: 2018-04-06 12:28:31
                49

                X-Ways Forensics & WinHex Manual

                Add to Reading List

                Source URL: www.x-ways.net

                Language: English - Date: 2018-03-08 10:30:02
                  50

                  CS461/ECE422 Computer Security I April 15, 2015 Project 5: Forensics

                  Add to Reading List

                  Source URL: courses.engr.illinois.edu

                  Language: English - Date: 2015-04-20 13:04:03
                    UPDATE